EasyManua.ls Logo

Xerox WorkCentre 5855 - User Manual

Xerox WorkCentre 5855
83 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
Document Version 2.0, Revision 2.0
Xerox Multi-Function Device
Security Target
WorkCentre 5845, 5855, 5865, 5875,
5890, 7220, 7225, 7830, 7835, 7845, 7855
& ColorQube 9301, 9302, 9303
Prepared by:
Xerox Corporation
Computer Sciences Corporation
800 Phillips Road
7231 Parkway Drive
Webster, New York 14580
Hanover, Maryland 21076

Table of Contents

Other manuals for Xerox WorkCentre 5855

Question and Answer IconNeed help?

Do you have a question about the Xerox WorkCentre 5855 and is the answer not in the manual?

Xerox WorkCentre 5855 Specifications

General IconGeneral
Print ResolutionUp to 1200 x 1200 dpi
Standard Paper Capacity1, 100 sheets
Duplex PrintingYes
Connectivity10/100/1000Base-T Ethernet, USB 2.0
FunctionsPrint, Copy, Scan, Fax
Processor1.2 GHz
Memory2 GB
Hard Drive160 GB
Scan ResolutionUp to 600 x 600 dpi
TypeLaser
Print Speed (Color)Up to 55 ppm
Copy ResolutionUp to 600 x 600 dpi
Print SpeedUp to 55 ppm
Copy Speed (Black)Up to 55 ppm
Dimensions640 x 670 x 1118 mm
Scan SpeedUp to 70 ipm (black and white / color)

Summary

Introduction

ST and TOE Identification

Details for the Security Target (ST) and Target of Evaluation (TOE).

TOE Overview

General overview of the Xerox WorkCentre multi-function device.

TOE Type

Specifies the type of Target of Evaluation (TOE).

Required Non-TOE Hardware, Software and Firmware

Details on hardware, software, and firmware not part of the TOE.

TOE Description

Detailed description of the Target of Evaluation (TOE).

Physical Scope of the TOE

Defines the physical components included in the TOE.

Logical Scope of the TOE

Defines the software and firmware scope of the TOE.

Evaluated Configuration

Features enabled and not included in the evaluated configuration.

Conformance Claims

Common Criteria Conformance Claims

Claims conformance to Common Criteria (CC) standards.

Protection Profile Claims

Claims conformance to IEEE Standard Protection Profile.

Package Claims

Claims conformance to EAL2 package and additional packages.

Rationale

Rationale for conformance claims and requirements.

Security Problem Definition

Definitions

Defines key terms used in the security problem definition.

Users

Identifies user roles interacting with the TOE.

Objects (Assets)

Defines passive entities (assets) within the TOE.

User Data

Describes data created by and for users.

TSF Data

Describes data created by and for the TOE.

Functions

Identifies processing, storage, and transmission functions.

Operations

Defines types of actions performed by subjects on objects.

Channels

Mechanisms for data transfer into and out of the TOE.

Assumptions

Conditions assumed to be true for security objectives.

Threats

Potential security threats to the TOE.

Threats Addressed by the TOE

Identifies threats the TOE is designed to counter.

Threats Addressed by the IT Environment

Identifies threats addressed by the IT environment.

Organizational Security Policies

Describes organizational security policies applicable to the TOE.

Security Objectives

Security Objectives for the TOE

Objectives the TOE must fulfill.

Security Objectives for the Operational Environment

Objectives for the IT environment supporting the TOE.

Security Objectives for the Non-IT Environment

Objectives for non-IT methods in the TOE environment.

Rationale for Security Objectives

Justification for how objectives mitigate threats and policies.

Extended Components Definition

FPT_FDI_EXP Restricted forwarding of data to external interfaces

Defines requirements to restrict data forwarding between external interfaces.

Security Requirements

Conventions

Explains conventions used for identifying SFRs and SARs.

TOE Security Policies

Defines security policies enforced by the TSF.

IP Filter SFP

Policy for filtering network traffic based on IP rules.

User Access Control SFP

Policy for controlling user access to objects and operations.

TOE Function Access Control SFP

Policy for controlling user access to TOE functions.

Security Functional Requirements

Lists and describes the TOE's functional security requirements.

Explicitly Stated Requirements for the TOE

Lists requirements explicitly stated for the TOE.

TOE Security Assurance Requirements

Lists security assurance requirements for the TOE.

Rationale for Security Functional Requirements

Explains how SFRs fulfill security objectives.

Rationale for Security Assurance Requirements

Justification for the selected assurance level and components.

Rationale for Dependencies

Explains how security functional requirement dependencies are met.

TOE Summary Specification

TOE Security Functions

Overview of security functions performed by the TOE.

Image Overwrite (TSF_IOW)

Functionality for overwriting temporary files on the HDD.

Information Flow Security (TSF_FLOW)

Controls data flow between interfaces and prevents unauthorized transmission.

Authentication (TSF_AUT)

Manages user identification and authentication.

Network Identification (TSF_NET_ID)

Manages identification via external servers.

Security Audit (TSF_FAU)

Generates and manages audit logs for events.

Cryptographic Operations (TSF_FCS)

Details cryptographic operations like encryption and signature.

User Data Protection - Disk Encryption (TSF_FDP_UDE)

Supports encryption of designated portions of the hard disk.

User Data Protection - IP Filtering (TSF_FDP_FILTER)

Enforces administrator-defined IPv4 filtering rules.

Network Security (TSF_NET_SEC)

Supports secure communication protocols like TLS, SFTP, IPsec.

Security Management (TSF_FMT)

Manages security functions and attributes.

Glossary

Acronyms

Bibliography

Related product manuals